First published: Fri Aug 24 2018(Updated: )
A flaw was found in the crypto subsystem of the Linux kernel before version kernel-4.15-rc4. The "null skcipher" was being dropped when each af_alg_ctx was freed instead of when the aead_tfm was freed. This can cause the null skcipher to be freed while it is still in use leading to a local user being able to crash the system or possibly escalate privileges.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <4.15 | 4.15 |
Linux Linux kernel | >=4.14<4.14.8 | |
Linux Linux kernel | =4.15-rc1 | |
Linux Linux kernel | =4.15-rc2 | |
Linux Linux kernel | =4.15-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.